Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2024, 09:47
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
991afdb17ca57b5ca6f94039c5529174.exe
Resource
win7-20231129-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
991afdb17ca57b5ca6f94039c5529174.exe
Resource
win10v2004-20231215-en
5 signatures
150 seconds
General
-
Target
991afdb17ca57b5ca6f94039c5529174.exe
-
Size
91KB
-
MD5
991afdb17ca57b5ca6f94039c5529174
-
SHA1
c7046b1a70e1385fb2f30a8bc34f2069728d32dc
-
SHA256
e5b132f4676676dee3988f360aecbc6af188e69694cbc7a9228d2ff1faeabcfe
-
SHA512
28ec6541eedf21aeb0d9c56ff4d464e063825a7ac7bd94f1040e3917c56d510b9064917dbc16d77a7d9a9d55cf13b32e9a67241b40500e805bbb6e44fcd5e17d
-
SSDEEP
1536:0kPPCuDrfQW3HeRiaSUTQcjf+nmjGpBzn7mJj0300p:rXfHe+YQXTmJj030
Score
6/10
Malware Config
Signatures
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini 991afdb17ca57b5ca6f94039c5529174.exe File opened for modification C:\Windows\assembly\Desktop.ini 991afdb17ca57b5ca6f94039c5529174.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly\Desktop.ini 991afdb17ca57b5ca6f94039c5529174.exe File opened for modification C:\Windows\assembly 991afdb17ca57b5ca6f94039c5529174.exe File created C:\Windows\assembly\Desktop.ini 991afdb17ca57b5ca6f94039c5529174.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3680 991afdb17ca57b5ca6f94039c5529174.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3680 991afdb17ca57b5ca6f94039c5529174.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: 33 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: SeIncBasePriorityPrivilege 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: 33 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: SeIncBasePriorityPrivilege 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: 33 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: SeIncBasePriorityPrivilege 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: 33 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: SeIncBasePriorityPrivilege 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: 33 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: SeIncBasePriorityPrivilege 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: 33 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: SeIncBasePriorityPrivilege 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: 33 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: SeIncBasePriorityPrivilege 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: 33 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: SeIncBasePriorityPrivilege 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: 33 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: SeIncBasePriorityPrivilege 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: 33 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: SeIncBasePriorityPrivilege 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: 33 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: SeIncBasePriorityPrivilege 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: 33 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: SeIncBasePriorityPrivilege 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: 33 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: SeIncBasePriorityPrivilege 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: 33 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: SeIncBasePriorityPrivilege 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: 33 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: SeIncBasePriorityPrivilege 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: 33 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: SeIncBasePriorityPrivilege 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: 33 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: SeIncBasePriorityPrivilege 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: 33 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: SeIncBasePriorityPrivilege 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: 33 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: SeIncBasePriorityPrivilege 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: 33 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: SeIncBasePriorityPrivilege 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: 33 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: SeIncBasePriorityPrivilege 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: 33 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: SeIncBasePriorityPrivilege 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: 33 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: SeIncBasePriorityPrivilege 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: 33 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: SeIncBasePriorityPrivilege 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: 33 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: SeIncBasePriorityPrivilege 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: 33 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: SeIncBasePriorityPrivilege 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: 33 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: SeIncBasePriorityPrivilege 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: 33 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: SeIncBasePriorityPrivilege 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: 33 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: SeIncBasePriorityPrivilege 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: 33 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: SeIncBasePriorityPrivilege 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: 33 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: SeIncBasePriorityPrivilege 3680 991afdb17ca57b5ca6f94039c5529174.exe Token: 33 3680 991afdb17ca57b5ca6f94039c5529174.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\991afdb17ca57b5ca6f94039c5529174.exe"C:\Users\Admin\AppData\Local\Temp\991afdb17ca57b5ca6f94039c5529174.exe"1⤵
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:3680